Home

Nadia Ndumu - AWS Engineer/Architect
[email protected]
Location: Jersey City, New Jersey, USA
Relocation: NO
Visa: USC
Name: Nadia Ndumu
Address: Jersey City, NJ 07302


Summary of Qualifications:
A self-motivated Cloud (AWS and Azure) Engineer offering about 8 years of experience in Cloud/Linux/ environments with proficiency in cloud orchestration, security, identity & access management, monitoring and event management, governance & compliance, application delivery, data protection, image and patch management, self-service and ops analytics in AWS and Azure platforms.

Technical Skills and Technology Stack:
Cloud Orchestration/Automation: AWS CloudFormation, AWS Lambda, AWS Systems Manager, AWS SSM Parameter Store, Ansible, Docker, Cron Job, terraform
AWS Security: AWS Security Hub, AWS Guard Duty, AWS Shield, AWS Firewall Manager, AWS Inspector
Monitoring & Event Management: AWS CloudWatch (Events & Logs), AWS SNS, AWS S3
Identity & Access Management: AWS Organization, AWS IAM, AWS AD Connector, Active Directory, AWS Workspaces, AWS Secrets Manager
Governance & Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Well Architected Tool, AWS Budgets, AWS License Manager
Programming Languages: Bash, JSON, YML, Python
Application Delivery: Jira, Confluence, Jenkins, Bitbucket, AWS Code Pipeline, AWS Code Commit,
Data Protection: AWS Certificate Manager, AWS KMS, Snapshot Lifecyle Manager, AWS Cloud HSM,
Self Service: Service Catalog
Network: VPC, VGW, TGW, CGW, IGW, NGW
Image & Patch: AWS SSM Patch Manager, AWS Golden AMI Pipeline
Ops Analytics: Splunk
AWS Platform: AWS CloudFormation, AWS Lambda, AWS Systems Manager, S3, VPC, EC2, ELB, RDS, SNS, SQS, SES, Route53, CloudFront, Service Catalog, AWS Auto Scaling, Trusted Advisor, CloudWatch, EKS


Education:
Bachelor of Science in Information Technology Management
University of Maryland Global Campus


Certifications :
Top Security Clearance
AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Professional
Certified Scrum Master


Professional Experience:

AWS Cloud Engineer
Dell 01/2021- Present
Led solutions architecture, IaC development/deployment, and configuration of cloud environments in alignment with FedRAMP and security controls
Designed, implemented, and deployed custom cloud networking, IAM, security tooling, AWS services and automation to meet client requirements
Planning, designing, and configuring AWS services (EC2, S3, IAM, Amazon Glacier, EBS, VPC, Elastic Load Balancing, Amazon Cloud Watch, Auto Scaling, Route 53, and Cloud Formation)
Managed provisioning of AWS infrastructures using CloudFormation
Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD.
Monitored end-to-end infrastructure using CloudWatch and SNS for notification
Used AWS system manager to automate operational tasks across AWS resources
Used System Manager to automate operational tasks across WK AWS infrastructure.
Setup AWS Single Sign On (SSO) for on premise Active Director (AD)
Built kinesis dashboards and applications that react to incoming data using AWS provided SDKs; and exported data from kinesis to other AWS services including EMR for analytics, S3 for storage, Redshift for big data and Lambda for event driven actions
Developed and documented security guardrails for AWS Cloud environments
Built custom images though docker server, docker compose with multiple local containers and created production grade workflows and a continuous application workflow for multiple images
Implemented multiple container deployments to AWS and maintained sets of containers with deployments
Optimized cost through reserved instances, selection and changing of EC2 instance types based on re-source need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling
Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications
Setup and configured logs files for detail monitoring and alerts notification when changes are made.
Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using Splunk
Deployed and configured infrastructure using Terraform and Ansible
Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs

AWS Architect/Engineer
Deloitte, Arlington VA 2/2019 01/2021
Developed and leveraged baseline and custom guardrails, policies, centralized policy enforcement, tagging policies and a well architected multi account environment.
Implemented Machine Image Pipeline and integrated Patch Management
Migrated legacy applications to AWS cloud environment
Leveraged Docker to build, test and deploy applications in different environments.
Developed LLDs for migrating various applications including network sizing, Instance types, names, tags etc.
Developed required and optional tagging reference document for automation, compliance and consolidated billing
Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect
Developed baseline AWS account security, implemented/integrated end-point protection, vulnerability scanning and intelligent threat detection
Built serverless architecture with Lambda integrated with SNS, Cloud watch logs and other AWS services.
Leveraged automated DevOps tools deployment and Blue-green deployment patterns and strategies
Configured CI/CD Pipelines using Jenkins connected to Git-hub and build environments (Dev, stage & Prod)
Implemented IAM best practices and role-based access control
Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions
Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup.
Setup Ansible control and slave nodes and developed playbooks to automation configuration of servers across environments.
I leveraged EKS to fully managed Kubernetes service, and to run sensitive and mission critical application due to its security, reliability, and scalability.
Leverage either the JSON or YAML format to author AWS CloudFormation templates
Leverage shell to quickly run scripts with the AWS Command Line Interface (AWS CLI)


AWS Architect/Engineer
Apple, Austin TX 01/2017 02/2019
Managed provisioning of AWS infrastructures using CloudFormation and/or terraform.
Designed a high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling and other disaster recovery models.
Created patch management using Systems Manager automation for multi-region and multi account execution
Implemented preventive guardrails using Service Control Policies (SCPs)
Implemented detective guardrails using Cloud Custodian policies and AWS config
Designed and implemented for elasticity and scalability using Elastic-Cache, CloudFront Edge locations, RDS (read replicas, instance sizes)
Implemented security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks
Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD.
Monitored end-to-end infrastructure using CloudWatch and SNS for notification
Used AWS system manager to automate operational tasks across AWS resources
Project Management -AWS Infra design & application migration
Used System Manager to automate operational tasks across WK AWS infrastructure.
Setup AWS Single Sign On (SSO) for on premise Active Director (AD)
Built kinesis dashboards and applications that react to incoming data using AWS provided SDKs; and exported data from kinesis to other AWS services including EMR for analytics, S3 for storage, Redshift for big data and Lambda for event driven actions
Developed and documented security guardrails for AWS Cloud environments
Built custom images though docker server, docker compose with multiple local containers and created production grade workflows and a continuous application workflow for multiple images
Implemented multiple container deployments to AWS and maintained sets of containers with deployments
Setup, configured and used Ad Hoc ansible command
Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS
Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, route53)
Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs
Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling
Leveraged EC2 Create Snapshot API call to create snapshots of EBS Volumes on scheduled intervals
Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications
Setup and configured logs files for detail monitoring and alerts notification when changes are made.
Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using New Relic
Deployed and configured infrastructure using Terraform and Ansible
Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI
Implemented identity federation using free IPA to enable users to seamlessly connect to multiple services


AWS/Linux Administrative
Accenture Federal, Plano TX 03/2014 01/2017
Performed applications installation, upgrades/patches, troubleshooting, maintenance, and monitoring Linux servers
Installation, configuration and administration of Enterprise Linux
Created, managed and administered user accounts security and SSH password-less login
Network configuration & troubleshoot issues with respect to network and configuration files
Task automation, service management and application deployment using Ansible and Jenkins
Build and configured Linux servers from scratch with type one hypervisors for virtualization and network components
Performed security setup, networking, system backup and patching for both AWS, and on-premises environments.
Architect high availability environment with auto scaling & Elastic Load Balancer
Securely deploy MySQL Primary DB and its read replica in private subnet with multi-AZ for disaster recovery and best practice
Migration of high availability webservers and databases to AWS EC2 and RDS with minimum or no downtime
VPC build with Private and Public Subnet couple with VPNs setup back to on premise datacenter and cooperate offices
VPC peering with other Accounts allowing access and routing to service and users of separate account to communicate.
SSL setup for Apache and Nginx application couple with AWS ELB SSL for all http to https thereby maximizing security
Network, CPU, Disk and connectivity monitoring with CloudWatch and setup to trigger alarm and notify system administrators
Aide setup for and configured for logs files detail monitoring and alerts notification when changes are made.
Performed root-cause analysis of recurring issues, system backup, and security setup
Security groups configured and locked down to the various authorized subnet and IP addresses in AWS
Automated deployment, configuration and security settings using Ansible
Experienced in Git-hub (cloning a Git repository, creating a branch, pushing to Git from local, and making a PR)
Architected and implemented continuous integration and deployment pipelines using Jenkins and other continuous integration
Keywords: continuous integration continuous deployment quality analyst sthree database active directory Arizona New Jersey Texas Virginia

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];3710
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: